Nothing Special   »   [go: up one dir, main page]

US9715590B2 - System and device for verifying the integrity of a system from its subcomponents - Google Patents

System and device for verifying the integrity of a system from its subcomponents Download PDF

Info

Publication number
US9715590B2
US9715590B2 US14/704,947 US201514704947A US9715590B2 US 9715590 B2 US9715590 B2 US 9715590B2 US 201514704947 A US201514704947 A US 201514704947A US 9715590 B2 US9715590 B2 US 9715590B2
Authority
US
United States
Prior art keywords
puf
computing system
trust
software application
verification
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active, expires
Application number
US14/704,947
Other versions
US20150317480A1 (en
Inventor
Douglas J. Gardner
John J. Walsh
John Ross Wallrabenstein
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Analog Devices Inc
Original Assignee
Analog Devices Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Analog Devices Inc filed Critical Analog Devices Inc
Priority to US14/704,947 priority Critical patent/US9715590B2/en
Priority to US14/746,090 priority patent/US9292692B2/en
Publication of US20150317480A1 publication Critical patent/US20150317480A1/en
Assigned to GREAT ROCK CAPITAL PARTNERS MANAGEMENT, LLC reassignment GREAT ROCK CAPITAL PARTNERS MANAGEMENT, LLC SECURITY AGREEMENT Assignors: SYPRIS DATA SYSTEMS, INC., SYPRIS ELECTRONICS, LLC, SYPRIS SOLUTIONS, INC., SYPRIS TECHNOLOGIES INTERNATIONAL, INC., SYPRIS TECHNOLOGIES KENTON, INC., SYPRIS TECHNOLOGIES MARION, LLC, SYPRIS TECHNOLOGIES MEXICAN HOLDINGS, LLC, SYPRIS TECHNOLOGIES NORTHERN, INC., SYPRIS TECHNOLOGIES SOUTHERN, INC., SYPRIS TECHNOLOGIES, INC.
Priority to DE112016001047.8T priority patent/DE112016001047B4/en
Priority to PCT/US2016/021264 priority patent/WO2016141383A1/en
Assigned to SYPRIS ELECTRONICS, LLC reassignment SYPRIS ELECTRONICS, LLC ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: GARDNER, DOUGLAS J., WALSH, JOHN J., WALLRABENSTEIN, JOHN ROSS
Assigned to SYPRIS SOLUTIONS, INC., SYPRIS TECHNOLOGIES NORTHERN, INC., SYPRIS ELECTRONICS, LLC, SYPRIS TECHNOLOGIES MEXICAN HOLDINGS, LLC, SYPRIS TECHNOLOGIES SOUTHERN, INC., SYPRIS TECHNOLOGIES INTERNATIONAL, INC., SYPRIS DATA SYSTEMS, INC., SYPRIS TECHNOLOGIES MARION, LLC, SYPRIS TECHNOLOGIES, INC., SYPRIS TECHNOLOGIES KENTON, INC. reassignment SYPRIS SOLUTIONS, INC. RELEASE BY SECURED PARTY (SEE DOCUMENT FOR DETAILS). Assignors: GREAT ROCK CAPITAL PARTNERS MANAGEMENT, LLC
Assigned to PNC BANK, NATIONAL ASSOCIATION reassignment PNC BANK, NATIONAL ASSOCIATION RELEASE BY SECURED PARTY (SEE DOCUMENT FOR DETAILS). Assignors: SIENA LENDING GROUP, LLC
Assigned to ANALOG DEVICES, INC. reassignment ANALOG DEVICES, INC. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: SYPRIS ELECTRONICS, LLC
Application granted granted Critical
Publication of US9715590B2 publication Critical patent/US9715590B2/en
Active legal-status Critical Current
Adjusted expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3218Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using proof of knowledge, e.g. Fiat-Shamir, GQ, Schnorr, ornon-interactive zero-knowledge proofs
    • H04L9/3221Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using proof of knowledge, e.g. Fiat-Shamir, GQ, Schnorr, ornon-interactive zero-knowledge proofs interactive zero-knowledge proofs
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3271Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
    • H04L9/3278Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response using physically unclonable functions [PUF]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/03Indexing scheme relating to G06F21/50, monitoring users, programs or devices to maintain the integrity of platforms
    • G06F2221/034Test or assess a computer or a system
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2105Dual mode as a secondary aspect
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2153Using hardware token as a secondary aspect

Definitions

  • the present invention relates to integrity verification of systems comprising electronic subcomponents.
  • a weapon system may require subcomponents to be internally validated during a boot process, or a vehicle may validate critical electronic control units on startup.
  • Prior art typically accomplishes the verification of a sub-component through a demonstration that it possesses a secret value, for example, through a zero knowledge proof of knowledge. This method of verification, however, may be associated with one or more constraints relating to hardware integrity or the security of private information.
  • existing sub-component authentication protocols only verify that an entity possesses a private value, and typically just infer hardware integrity if the device has a physical construction designed to deter tampering (e.g., a hardware security module). Even with a tamper resistant physical construction, the integrity of the physical construction is not inextricably linked to the integrity of the device itself.
  • existing sub-component authentication protocols require that the sub-component store and protect private information (typically a private key for cryptographic authentication protocols). If the private information is compromised, it may be possible for an adversary to masquerade as a valid sub-component in the larger system.
  • Peeters (“Security Architecture for Things That Think,” Diss. Ph. D. thesis, KU Leuven, June 2012) describes using a PUF in resource-constrained devices for regenerating a share from an external threshold system composed of a user's devices.
  • the PUF is applied solely as a storage mechanism, eliminating the need to store the share in plaintext on the device. However, no internal threshold application is given, nor is the challenge-helper pair ever refreshed.
  • Krzywiecki et al. (“Coalition resistant anonymous broadcast encryption scheme based on PUF,” Trust and Trustworthy Computing. Springer Berlin Heidelberg, 2011, 48-62) describe a broadcast encryption scheme where subscribers must invoke a PUF-enabled card to regenerate shares of a threshold system.
  • the construction requires an incorruptible distributor to store and protect raw PUF output.
  • the system is designed to allow an end device to recover a symmetric key only if it has not been revoked by the broadcaster.
  • the PUF-enabled receiving device must construct the full symmetric key from its shares in order to decrypt the incoming transmission. No internal threshold application is given, nor is the challenge-helper pair ever refreshed.
  • Khoshroo et al. (“Design and Evaluation of FPGA-based Hybrid Physically Unclonable Functions,” Diss. Western University London, 2013) describe a modified secret sharing scheme, where each player's share is a challenge-helper pair generated from the dealer's PUF.
  • the actual shares for the threshold system are recovered only given both the challenge-helper pair and access to the PUF, which regenerates the share from the challenge-helper pair.
  • an adversary can compromise all of the end devices, and yet is unable to recover the secret without access to the PUF. No cryptographic operations are possible over these pseudo-shares.
  • the shared secret may only be recovered if all of the shares are regenerated, and the dealer is assumed to be incorruptible.
  • the dealer's PUF is used only as a method for obfuscating the shares that are distributed to players.
  • Various embodiments of the invention provide for the verification of a set of subcomponents of an electronic system, such that the integrity of the system as a whole is deduced therefrom.
  • One embodiment of the invention employs physical unclonable functions (PUFs) for detecting hardware tampering in integrated circuits (ICs), and zero knowledge proof protocols for authentication. In one embodiment this is done by individual verification of subcomponents; in another embodiment, relevant sub-components may be verified together, with each generating a local proof of validity and collaborating to combine their local proofs into a single proof that validates the integrity of the system as a whole.
  • PAFs physical unclonable functions
  • systemic trust may be established even if the system's sub-components themselves are untrusted, by employing a hardware root-of-trust that iteratively extends the trust boundary as each sub-component is verified.
  • FIG. 1 is a system diagram illustrating (1, 1) integrity verification of sub-components
  • FIG. 2 is a system diagram illustrating (n, 1) integrity verification of sub-components.
  • FIG. 3 illustrates a system establishing trust through layered security derived from a high assurance processor.
  • each of a system's n relevant sub-components may be interrogated (e.g., sequentially) through an interactive or non-interactive zero-knowledge proof of knowledge.
  • Authentication algorithms such as those disclosed in the '848 and '586 applications (elliptic curve-based) or in U.S. Pat. No. 8,918,647 (discrete log-based; “the '647 patent,” which is incorporated here by reference), for example, may be used to establish the hardware integrity of components having trusted means of gathering private information, such as physical unclonable functions.
  • a PUF links the evaluation of a function with the hardware on which it is executed, such that any adversarial tampering of the hardware affects the evaluation of the function.
  • the hardware integrity of the device can be deduced by an external verifier from its ability to successfully complete the zero knowledge proof protocol.
  • the PUF may also be configured to dynamically generate private information from only public information, so that sub-components need not store and protect private information.
  • integrity of the system may be established through a single collaborative response from all (or a subset of) the subcomponents by constructing a threshold proof that requires all or some subset of the n subcomponents to be functioning correctly. In that case, rather than construct a separate proof for each of the n components, they collaboratively construct a single proof that establishes the validity of all or a subset of the n components simultaneously.
  • each subcomponent interacts directly with the verifier V.
  • the verifier V issues a nonce as part of a two message protocol with each subcomponent.
  • non-interactive (1, 1) verification each subcomponent sends only a single message to the verifier V, and includes a value equivalent to a nonce (e.g., a timestamp) that cannot be manipulated by the subcomponent.
  • a subset of the n subcomponents collaboratively generate a single joint proof, which convinces the verifier V of the integrity of the subset of n subcomponents.
  • the verifier V issues a nonce as part of a two message protocol, where a subset of subcomponents act jointly and send only a single response.
  • non-interactive (n, 1) verification a subset of subcomponents send only a single message to the verifier V, which includes a value equivalent to a nonce (e.g., a timestamp) that cannot be manipulated by any subset of the subcomponents.
  • a zero knowledge authentication protocol typically requires a unique and random nonce to be issued by the verifier V during each protocol invocation.
  • the nonce prevents the proof from the verifier from being reused in the future (i.e., a replay attack), and the proving subcomponent must not be able to influence its value.
  • the '848 application discloses a derived token-based zero knowledge proof protocol, the teachings regarding which are incorporated here by reference, summarized as follows:
  • (1, 1) verification the verifier individually interrogates each subcomponent in order to establish the integrity of the larger system; all (or all specified) subcomponents successfully complete a zero knowledge proof with the verifier in order for the verification of the integrity of the system as a whole to succeed.
  • the verifier is illustrated sequentially validating each of the system's sub-components. At first verification 1 and second verification 2, the verifier validates each critical sub-system component. At third verification 3 and fourth verification 4, the verifier validates each non-critical sub-system component. An interactive version of this process is set forth in Algorithm 1.
  • the requirement for communication from the verifier V in the interactive zero knowledge proof is to obtain a nonce value specific to the current proof. This prevents an eavesdropping adversary from using previous proofs from a valid subcomponent to successfully complete an authentication protocol and masquerade as a valid subcomponent.
  • a non-interactive zero knowledge proof removes this communication requirement.
  • a non-interactive version of Algorithm 1 can be made by configuring the subcomponent to generate a nonce in a manner that prevents the proving subcomponent from manipulating the proof. To accomplish this, the subcomponent device d i constructs the nonce N ⁇ Hash(p i priv ⁇ G mod p ⁇ ) where ⁇ is a timestamp and ⁇ denotes concatenation.
  • the timestamp ensures that previous proofs constructed by the proving subcomponent cannot be replayed by an adversary in the future, while the hash function ensures that the proving subcomponent cannot manipulate the challenge in an adversarial manner.
  • the verifier preferably checks that the timestamp is reasonably current (e.g., second granularity) and monotonically increasing to prevent replay attacks. Alternately, globally-synchronized clocks may be used rather than a timestamp, such as if network latency is not significant.
  • a non-interactive version of (1, 1) verification is set forth in Algorithm 2, with each sub-component locally choosing a current timestamp ⁇ to construct its nonce.
  • an external entity denoted Verifier
  • Verifier would like to verify that all critical subsystems are functioning properly, and/or to verify the system as a whole, as satisfied by some fraction of non-critical or redundant subsystems functioning properly.
  • a threshold (n, 1) approach the verifier establishes the integrity of the larger system from a single joint proof constructed by combining local proofs from each sub-component.
  • first threshold proof 5 and second threshold proof 6 the critical sub-components contribute their local proofs.
  • third threshold proof 7 and fourth threshold proof 8 the remaining sub-components contribute their local proofs to form a single, joint proof.
  • the Verifier validates the joint proof (such as by Algorithm 6) to establish the validity of the system as a whole.
  • One method for verifying a set of critical and non-critical components is to generate a separate sharing for each set.
  • This na ⁇ ve approach requires the verifier to check two proofs: one generated by the critical components, and another generated by the non-critical components.
  • a more efficient method for combining both critical and non-critical components would be to generate a single proof that represents both component groups.
  • a single proof that enforces all critical components and a subset of non-critical components may be constructed by properly distributing shares.
  • This more efficient approach differs from the simpler na ⁇ ve approach, where x critical components form a (x,x) sharing, and the y non-critical components form a (z,y) sharing, where z ⁇ y.
  • a (k,k) sharing can be constructed such that all k subsystems must collaborate to complete a single zero knowledge proof.
  • the verifier only needs to verify a single zero knowledge proof in order to authenticate and verify a set of k critical components.
  • a (t,n) sharing can be constructed for redundant systems, such that t of the n redundant subsystems must be functioning to complete the zero knowledge proof.
  • the subsystems can jointly construct a single threshold zero knowledge proof to represent the system they compose.
  • Algorithm 3 illustrates an example of a subset of subcomponent devices D ⁇ D,
  • m ⁇ n constructing a joint threshold zero knowledge proof for the verifier V.
  • the verifier combines the partial zero knowledge proofs (thus, implying O(n) work for V as the number of partial proofs is n)
  • a secretary could instead combine the partial shares and forward the result to the verifier.
  • the subcomponents could form a ring, and pass their partial shares to the next subcomponent, which combines their own partial proof before forwarding on to the next subcomponent.
  • the Enrollment Algorithm, Distributed Key Generation Algorithm, and PUF-Retrieve are set forth in the '920 application.
  • Algorithm 3 can be performed non-interactively. This is accomplished by replacing the verifier's nonce N with a timestamp ⁇ generated by the components, as illustrated in Algorithm 4.
  • the timestamp serves as a replacement for the server's randomness N, and prevents replay attacks by adding a temporal requirement to the proof. That is, the timestamp is monotonically increasing, and the verifier simply checks that the timestamp used in the proof is reasonably (e.g., second granularity) current.
  • Algorithm 5 illustrates a further refinement of Algorithm 3 that incorporates updating the challenge-helper pair and share after each operation.
  • the PUF-Share-Update and PUF-Store algorithms are set forth in the '920 application.
  • An additional embodiment of the invention is a system achieving a layered security approach across all computing levels by deriving a hardware root-of-trust from a high assurance processor.
  • the high assurance processor is used to validate all layers in a computing architecture, providing secure boot control, change detection, alarm indicators and audit functions.
  • FIG. 3 illustrates the high assurance processor in an exemplary computing architecture.
  • Secure computing architectures create a layered security approach, where the trusted boundary is iteratively extended from a core root-of-trust.
  • a trusted boot procedure assumes a minimal trust boundary (e.g., a root-of-trust, such as a trusted platform module (TPM)) and iteratively extends the trust boundary by validating each component of the system as it boots. This mitigates risk from components more susceptible to adversarial modification, such as the operating system or applications.
  • the root-of-trust is used to detect modification to system components, and will only complete the boot sequence if all components are validated as correct.
  • existing trusted boot systems typically rely on roots-of-trust that are assigned (rather than intrinsic) to the device.
  • TPMs hold a private key in protected memory that represents the identity of the system.
  • an adversary that extracts the assigned identity is able to masquerade as the system.
  • existing systems do not provide intrinsic tamper detection, and rely on tamper detecting hardware enclosures for security.
  • Existing roots-of-trust are illustrated in FIG. 3 at the root of trust layer 14 , which is situated above the hardware layer.
  • One embodiment of the invention employs a high assurance processor based on a PUF that captures intrinsic and unique properties of the hardware and preferably provides intrinsic hardware tamper detection.
  • the PUF mapping is a function of the physical properties of the hardware, it can be used to generate a hardware-intrinsic identity that represents the physical state of the system.
  • high assurance processor 10 which is at the hardware layer, is established as the root-of-trust for the system and forms a layered security architecture interaction with application layer 11 , operating system layer 12 , network layer 13 , root of trust layer 14 , and hardware layer 15 .
  • the high assurance processor 10 addresses NIST SP 800-53 Rev. 4 (“Security and Privacy Controls for Federal Information Systems and Organizations”) Security Capability, where trust is derived from interactions among system sub-components.
  • the high assurance processor 10 may be used in mutual reinforcement controls within the system, where the high assurance processor 10 may validate an existing root-of-trust and vice versa.
  • the high assurance processor 10 is preferably designed to interact with the system through common commercial standard interfaces (e.g., USB, Ethernet) to enable interaction with commercial-off-the-shelf devices without hardware modification, and integration and continued support may be achieved through firmware and/or software upgrades.
  • the high assurance processor 10 may be used to extend and/or interact with existing roots-of-trust (e.g., TPM, ARM TrustZone). This enables a system with an existing trusted boot process to remain essentially unchanged, as the high assurance processor 10 can first validate the existing root-of-trust (which can subsequently complete the existing trusted boot process).
  • the high assurance processor 10 may be used to validate applications prior to execution, for example by storing a cryptographic hash of the application code or binary executable when it is first installed from a trusted source.
  • the high assurance processor 10 signs the cryptographic hash, which may be stored on the system.
  • the high assurance processor 10 first computes a cryptographic hash of the current application code or binary executable, validates its signature on the stored cryptographic hash, and validates that the two hash outputs match. If any of these checks fail, the high assurance processor 10 preferably halts execution of the application and issues an alarm.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)

Abstract

A system and device for verifying the integrity of a system from its subcomponents, the system comprising a plurality of subcomponents each having a physical state, the system and the device comprising a processor that is connected to each of the subcomponents, the processor configured to verify systemic integrity by performing verification on some or all specified subcomponents. The verification may be individual (1,1) or threshold (n,1), and may be interactive or non-interactive.

Description

REFERENCE TO RELATED APPLICATIONS
This application claims the benefit of the priority of and incorporates by reference U.S. Provisional Patent Application Ser. No. 61/988,848 filed May 5, 2014 (“the '848 application”), Ser. No. 62/128,920 filed Mar. 5, 2015 (“the '920 application”), and Ser. No. 62/150,586 filed Apr. 21, 2015 (“the '586 application”), and claims the benefit of the priority of U.S. Provisional Patent Application Ser. No. 62/150,254 filed Apr. 20, 2015.
FIELD OF THE INVENTION
The present invention relates to integrity verification of systems comprising electronic subcomponents.
BACKGROUND OF THE INVENTION
In many applications, it can be useful to employ means for verifying the integrity of a system by interrogating the subcomponents it is composed of. For example, a weapon system may require subcomponents to be internally validated during a boot process, or a vehicle may validate critical electronic control units on startup. Prior art typically accomplishes the verification of a sub-component through a demonstration that it possesses a secret value, for example, through a zero knowledge proof of knowledge. This method of verification, however, may be associated with one or more constraints relating to hardware integrity or the security of private information. As to hardware integrity, existing sub-component authentication protocols only verify that an entity possesses a private value, and typically just infer hardware integrity if the device has a physical construction designed to deter tampering (e.g., a hardware security module). Even with a tamper resistant physical construction, the integrity of the physical construction is not inextricably linked to the integrity of the device itself. As to the security of private information, existing sub-component authentication protocols require that the sub-component store and protect private information (typically a private key for cryptographic authentication protocols). If the private information is compromised, it may be possible for an adversary to masquerade as a valid sub-component in the larger system.
Asim et al. (‘Physical Unclonable Functions and Their Applications to Vehicle System Security,’ Vehicular Technology Conference, VTC Spring 2009, IEEE 69th) discusses using PUFs in vehicle components as a method for regenerating private keys, which is a well-known application. However, they fail to give an enabling construction allowing a system-wide identity to be constructed from each of the individual components.
Rigaud (editor) in “D3.1 Report on Protocol choice and implementation,” Holistic Approaches for Integrity of ICT-Systems (2014) describes applying PUFs to chips as a method for authenticating a chip (the device-under-test) to the testing equipment, which could detect fake chips. However, there is no construction that would enable a system-wide identity to be constructed from each of the individual chips.
Ibrahim et al. (“Cyber-physical security using system-level pufs,” Wireless Communications and Mobile Computing Conference (IWCMC), 2011 7th Intl, IEEE) discusses the general concept of combining PUFs from distinct system components to form a combined identity, but they fail to give an enabling construction. In their concluding remarks, the authors specifically state that they lack a realized solution.
Peeters (“Security Architecture for Things That Think,” Diss. Ph. D. thesis, KU Leuven, June 2012) describes using a PUF in resource-constrained devices for regenerating a share from an external threshold system composed of a user's devices. The PUF is applied solely as a storage mechanism, eliminating the need to store the share in plaintext on the device. However, no internal threshold application is given, nor is the challenge-helper pair ever refreshed.
Krzywiecki et al. (“Coalition resistant anonymous broadcast encryption scheme based on PUF,” Trust and Trustworthy Computing. Springer Berlin Heidelberg, 2011, 48-62) describe a broadcast encryption scheme where subscribers must invoke a PUF-enabled card to regenerate shares of a threshold system. The construction requires an incorruptible distributor to store and protect raw PUF output. The system is designed to allow an end device to recover a symmetric key only if it has not been revoked by the broadcaster. The PUF-enabled receiving device must construct the full symmetric key from its shares in order to decrypt the incoming transmission. No internal threshold application is given, nor is the challenge-helper pair ever refreshed.
Khoshroo et al. (“Design and Evaluation of FPGA-based Hybrid Physically Unclonable Functions,” Diss. Western University London, 2013) describe a modified secret sharing scheme, where each player's share is a challenge-helper pair generated from the dealer's PUF. The actual shares for the threshold system are recovered only given both the challenge-helper pair and access to the PUF, which regenerates the share from the challenge-helper pair. As each share is worthless without access to the PUF, an adversary can compromise all of the end devices, and yet is unable to recover the secret without access to the PUF. No cryptographic operations are possible over these pseudo-shares. The shared secret may only be recovered if all of the shares are regenerated, and the dealer is assumed to be incorruptible. The dealer's PUF is used only as a method for obfuscating the shares that are distributed to players.
SUMMARY OF THE INVENTION
Various embodiments of the invention provide for the verification of a set of subcomponents of an electronic system, such that the integrity of the system as a whole is deduced therefrom. One embodiment of the invention employs physical unclonable functions (PUFs) for detecting hardware tampering in integrated circuits (ICs), and zero knowledge proof protocols for authentication. In one embodiment this is done by individual verification of subcomponents; in another embodiment, relevant sub-components may be verified together, with each generating a local proof of validity and collaborating to combine their local proofs into a single proof that validates the integrity of the system as a whole.
In another embodiment, which may be provided individually or in combination with one or more of the foregoing embodiments, systemic trust may be established even if the system's sub-components themselves are untrusted, by employing a hardware root-of-trust that iteratively extends the trust boundary as each sub-component is verified.
BRIEF DESCRIPTION OF THE DRAWINGS
FIG. 1 is a system diagram illustrating (1, 1) integrity verification of sub-components;
FIG. 2 is a system diagram illustrating (n, 1) integrity verification of sub-components; and
FIG. 3 illustrates a system establishing trust through layered security derived from a high assurance processor.
DETAILED DESCRIPTION OF EMBODIMENTS
In one embodiment, each of a system's n relevant sub-components may be interrogated (e.g., sequentially) through an interactive or non-interactive zero-knowledge proof of knowledge. Authentication algorithms such as those disclosed in the '848 and '586 applications (elliptic curve-based) or in U.S. Pat. No. 8,918,647 (discrete log-based; “the '647 patent,” which is incorporated here by reference), for example, may be used to establish the hardware integrity of components having trusted means of gathering private information, such as physical unclonable functions. A PUF links the evaluation of a function with the hardware on which it is executed, such that any adversarial tampering of the hardware affects the evaluation of the function. By further linking the PUF output with the construction of the zero knowledge proof, the hardware integrity of the device can be deduced by an external verifier from its ability to successfully complete the zero knowledge proof protocol. The PUF may also be configured to dynamically generate private information from only public information, so that sub-components need not store and protect private information. In another embodiment, integrity of the system may be established through a single collaborative response from all (or a subset of) the subcomponents by constructing a threshold proof that requires all or some subset of the n subcomponents to be functioning correctly. In that case, rather than construct a separate proof for each of the n components, they collaboratively construct a single proof that establishes the validity of all or a subset of the n components simultaneously.
Subcomponent Authentication
In the individual interrogation method of verification, or “(1, 1) verification,” each subcomponent interacts directly with the verifier V. In interactive (1, 1) verification, the verifier V issues a nonce as part of a two message protocol with each subcomponent. In non-interactive (1, 1) verification, each subcomponent sends only a single message to the verifier V, and includes a value equivalent to a nonce (e.g., a timestamp) that cannot be manipulated by the subcomponent. In the collaborative method of verification, or “(n, 1) verification,” a subset of the n subcomponents collaboratively generate a single joint proof, which convinces the verifier V of the integrity of the subset of n subcomponents. In interactive (n, 1) verification, the verifier V issues a nonce as part of a two message protocol, where a subset of subcomponents act jointly and send only a single response. In non-interactive (n, 1) verification, a subset of subcomponents send only a single message to the verifier V, which includes a value equivalent to a nonce (e.g., a timestamp) that cannot be manipulated by any subset of the subcomponents.
For the purposes of providing a detailed description of an embodiment, the example of an elliptic curve-based construction is utilized, with E denoting an elliptic curve defined over a finite field
Figure US09715590-20170725-P00001
. where G is a base point of order q. One of ordinary skill will recognize that the invention (be it (1, 1), (n, 1), and/or layered security) can be readily implemented using various other constructions (with just one example alternative being the '647 patent's discrete logarithm construction). Thus the invention is not limited to any particular construction, except where specifically stated in the claims.
A zero knowledge authentication protocol typically requires a unique and random nonce to be issued by the verifier V during each protocol invocation. The nonce prevents the proof from the verifier from being reused in the future (i.e., a replay attack), and the proving subcomponent must not be able to influence its value. For example, the '848 application discloses a derived token-based zero knowledge proof protocol, the teachings regarding which are incorporated here by reference, summarized as follows:
Interactive Authentication Algorithm for an Individual Device
for Server s do
 Device d ← {c, E, G, p, q, P, N} where N is a nonce and P is the
 helper string
for PUF Device d do
 x ← Hash(c, E, G, p, q)
 pi riv ← D(PUF(x) ⊕ P) where PUF(•) is the PUF function and D is an
 error decoding scheme
 r ← random ∈
Figure US09715590-20170725-P00002
q, a random group element
 B ← r · G mod p
 c′ ← Hash(G, B, A, N), (a hash, not a challenge)
 m ← r + c′ · pi priv mod q
 Server s ← {B, m}
for Server s do
 c′ ← Hash(G, B, A, N)
 D ← m · G − c′ · A mod p
Device d { accept : D = B deny : D B

This algorithm proceeds as follows:
    • Prior to authentication, the server has issued a random challenge variable c to the device, which is used to form a PUF challenge input x. The enrollment server and device agree on an elliptic curve E defined over a finite field
      Figure US09715590-20170725-P00001
      p where G is a base point of order q. The device di returns a public commitment A=pi priv. G to the server, which links its PUF to the challenge variable c (on which the challenge input x depends), and a public helper value P that will correct the noisy PUF output.
    • When the server wishes to authenticate the device, it issues an authentication request and the tuple {c, E, G, p, q, P, N} is sent to the device.
    • The device constructs the PUF challenge input x←H (c, E, G, p, q), which links the challenge variable c with the public parameters of the elliptic curve, and passes it to the PUF yielding output O′, which is ⊕'d with helper value P and the result decoded using an error decoding scheme D.
    • As the PUF output is noisy, when queried on challenge x again in the future, the new output O′ may not exactly match the previous output value O. However, it is assumed that O and O′ will be t-close with respect to some distance metric (e.g. Hamming distance). Thus, an error correcting code may be applied to the PUF output such that at most t errors will still recover O. During enrollment, error correction was applied over the random group element pi priv, and then this value was blinded with the output of the PUF O, so that the final helper value P=ECC(pi priv)⊕O reveals no information about pi priv. During recovery for authentication, computing the exclusive- or of ECC(rand)⊕O⊕O′ will return pi priv whenever O and O′ are t-close. This process is referred to as fuzzy extraction, and is detailed further in the '848 application (see “Gen Algorithm,”, “Rep Algorithm,” and Definition 3).
    • The device chooses a random group element rε
      Figure US09715590-20170725-P00001
      q and computes point B=r·C.
    • The server's nonce N is linked to the proof by constructing a hash c′ that also combines the base point G, the device's nonce B, and its public key A.
    • The device constructs the zero knowledge proof token (B, m=r+c′·pi priv mod p), and returns this tuple to the server.
    • The server verifies that:
{ ( m · G ) - ( c · A ) } = { ( ( r + c · p i priv ) · G ) - ( c · p i priv · G ) } = { r · G + c · p i priv · G - c · p i priv · G } = r · G = B
(1, 1) Verification
In (1, 1) verification, the verifier individually interrogates each subcomponent in order to establish the integrity of the larger system; all (or all specified) subcomponents successfully complete a zero knowledge proof with the verifier in order for the verification of the integrity of the system as a whole to succeed. Referring to FIG. 1, the verifier is illustrated sequentially validating each of the system's sub-components. At first verification 1 and second verification 2, the verifier validates each critical sub-system component. At third verification 3 and fourth verification 4, the verifier validates each non-critical sub-system component. An interactive version of this process is set forth in Algorithm 1.
Algorithm 1 Interactive (1, 1) System Verification
for each Subcomponent Device di
Figure US09715590-20170725-P00003
 do
 for Verifier  
Figure US09715590-20170725-P00004
 do
  di ← {ci, G, p, Pi, Ni} where Ni is a nonce and Pi is the helper string
 xi ← Hash(ci, E, G, n)
 pi priv ← D(PUF(xi) ⊕ Pi) where PUF(•) is the PUF output function and
 D is an error decoding scheme
 Ai = pi priv · G mod p
 ri ← random ∈
Figure US09715590-20170725-P00005
q, a random group element
 Bi ← ri · G mod p
 ci′ ← Hash(G, Bi, Ai, Ni)
 mi ← ri + ci′ · pi priv mod q
 Verifier  
Figure US09715590-20170725-P00004
 ← {Bi, mi}
 for Verifier  
Figure US09715590-20170725-P00004
 do
  Ai = pi priv · G mod p (stored from device enrollment)
  ci′ ← Hash(G, Bi, Ai, Ni)
  Di ← mi · G − ci′ · Ai mod p
   Subcomponent Device d i { accept : D i = B i deny : D i B i
for Verifier  
Figure US09715590-20170725-P00004
 do
System { accept : i , D i = B i deny : i s . t . D i B i
The requirement for communication from the verifier V in the interactive zero knowledge proof is to obtain a nonce value specific to the current proof. This prevents an eavesdropping adversary from using previous proofs from a valid subcomponent to successfully complete an authentication protocol and masquerade as a valid subcomponent. A non-interactive zero knowledge proof removes this communication requirement. A non-interactive version of Algorithm 1 can be made by configuring the subcomponent to generate a nonce in a manner that prevents the proving subcomponent from manipulating the proof. To accomplish this, the subcomponent device di constructs the nonce N←Hash(pi priv·G mod p∥τ) where τ is a timestamp and ∥ denotes concatenation. The timestamp ensures that previous proofs constructed by the proving subcomponent cannot be replayed by an adversary in the future, while the hash function ensures that the proving subcomponent cannot manipulate the challenge in an adversarial manner. The verifier preferably checks that the timestamp is reasonably current (e.g., second granularity) and monotonically increasing to prevent replay attacks. Alternately, globally-synchronized clocks may be used rather than a timestamp, such as if network latency is not significant. A non-interactive version of (1, 1) verification is set forth in Algorithm 2, with each sub-component locally choosing a current timestamp τ to construct its nonce.
Algorithm 2 Non-Interactive (1, 1) System Verification
for each Subcomponent Device di
Figure US09715590-20170725-P00003
 do
 xi ← Hash(ci, E, G, n)
 pi priv ← D(PUF(xi) ⊕ Pi) where PUF(•) is the PUF output function and
 D is an error decoding scheme
 Ai = pi priv · G mod p
 ri ← random ∈
Figure US09715590-20170725-P00006
n, a random group element
 Bi ← ri · G mod p
 Ni ← Hash(A∥τ) where τ is the current timestamp
 ci′ ← Hash(G, Bi, Ai, Ni)
 mi ← ri + ci′ · pi priv mod q
 Verifer  
Figure US09715590-20170725-P00004
 ← {Bi, mi, τ}
 for Verifier  
Figure US09715590-20170725-P00004
 do
  Ai = pi priv · G mod p (stored from device enrollment)
  Ni ← Hash(A∥τ)
  ci′ ← Hash(G, Bi, Ai, Ni)
  Di ← mi · G − ci′ · Ai mod p
   Subcomponent Device d i { accept : D i = B i check ( τ ) deny : D i B i ! check ( τ )
for Verifier  
Figure US09715590-20170725-P00004
 do
System { accept : i , D i = B i check ( τ i ) deny : i s . t . D i B i ! check ( τ i )

(n, 1) Verification
Referring now to FIG. 2, an external entity, denoted Verifier, would like to verify that all critical subsystems are functioning properly, and/or to verify the system as a whole, as satisfied by some fraction of non-critical or redundant subsystems functioning properly. In a threshold (n, 1) approach, the verifier establishes the integrity of the larger system from a single joint proof constructed by combining local proofs from each sub-component. At first threshold proof 5 and second threshold proof 6, the critical sub-components contribute their local proofs. At third threshold proof 7 and fourth threshold proof 8, the remaining sub-components contribute their local proofs to form a single, joint proof. At combined verification 9 the Verifier validates the joint proof (such as by Algorithm 6) to establish the validity of the system as a whole.
One method for verifying a set of critical and non-critical components is to generate a separate sharing for each set. This naïve approach requires the verifier to check two proofs: one generated by the critical components, and another generated by the non-critical components. However, a more efficient method for combining both critical and non-critical components would be to generate a single proof that represents both component groups. In fact, a single proof that enforces all critical components and a subset of non-critical components may be constructed by properly distributing shares. This more efficient approach differs from the simpler naïve approach, where x critical components form a (x,x) sharing, and the y non-critical components form a (z,y) sharing, where z<y. As a concrete example, assume there are two critical components (both of which must be operational) and two non-critical components (at least one of which must be operational). A (5, 6) sharing is constructed, where each critical component receives two shares, and each non-critical component receives one share. If one of the critical components fails, there are only four shares between the remaining critical component and the two non-critical components. Similarly, if both of the non-critical components fail, there are only four shares between the two operational critical components. However, with both critical components and at least one non-critical component functioning, the necessary five shares may be recovered to correctly construct the proof. Thus, a set of requirements for critical and non-critical components can be satisfied with a single proof by properly allocating shares of the (t,n) system.
Referring to the threshold methods disclosed in the '920 application, which are incorporated by reference, for example, to satisfy the requirement that all k critical subsystems (k=2 in FIG. 2) are functioning properly, a (k,k) sharing can be constructed such that all k subsystems must collaborate to complete a single zero knowledge proof. Thus, the verifier only needs to verify a single zero knowledge proof in order to authenticate and verify a set of k critical components. Similarly, a (t,n) sharing can be constructed for redundant systems, such that t of the n redundant subsystems must be functioning to complete the zero knowledge proof. Thus, rather than complete O(n) zero knowledge proofs for n subsystems, the subsystems can jointly construct a single threshold zero knowledge proof to represent the system they compose.
Algorithm 3 illustrates an example of a subset of subcomponent devices D D,|D|=m≦n constructing a joint threshold zero knowledge proof for the verifier V. Although in this example the verifier combines the partial zero knowledge proofs (thus, implying O(n) work for V as the number of partial proofs is n), a secretary could instead combine the partial shares and forward the result to the verifier. As another alternative, the subcomponents could form a ring, and pass their partial shares to the next subcomponent, which combines their own partial proof before forwarding on to the next subcomponent. The Enrollment Algorithm, Distributed Key Generation Algorithm, and PUF-Retrieve are set forth in the '920 application.
Algorithm 3 Interactive Threshold Proof Construction
Goal: Perform threshold zero knowledge proof at time τ
One-Time Setup Stage
for each Subsystem Device di
Figure US09715590-20170725-P00003
 do
 Run Enrollment Algorithm
 Run Distributed Key Generation Algorithm
Evaluation Stage
for Verifier
Figure US09715590-20170725-P00007
 do
 Broadcast ephemeral nonce N to all di ∈  
Figure US09715590-20170725-P00003
for all Participants pi ∈  
Figure US09715590-20170725-P00008
 do
 Recover share ri ← PUF-Retrieve(ci, helperi)
 Choose a random yi
Figure US09715590-20170725-P00009
q
 Compute and broadcast Bi = yi · G mod p to all di ∈  
Figure US09715590-20170725-P00003
 Compute
   B = y · G = i = 1 t B i mod p
  e = Hash(G, B,
Figure US09715590-20170725-P00008
pub, N)
   M i = y i + r i e ( j = 1 j i t - j i - j ) mod q
 Send (Bi, Mi) to verifier  
Figure US09715590-20170725-P00007
Similarly, Algorithm 3 can be performed non-interactively. This is accomplished by replacing the verifier's nonce N with a timestamp τ generated by the components, as illustrated in Algorithm 4. The timestamp serves as a replacement for the server's randomness N, and prevents replay attacks by adding a temporal requirement to the proof. That is, the timestamp is monotonically increasing, and the verifier simply checks that the timestamp used in the proof is reasonably (e.g., second granularity) current.
Algorithm 4 Non-Interactive Threshold Proof Construction
Goal: Perform non-interactive threshold zero knowledge proof at time τ
One-Time Setup Stage
for each Subsystem Device di
Figure US09715590-20170725-P00003
 do
 Run Enrollment Algorithm
 Run Distributed Key Generation Algorithm
Evaluation Stage
for all Participants pi
Figure US09715590-20170725-P00008
 do
 Fix current timestamp τ
 Recover share ri ← PUF-Retrieve(ci, helperi)
 Choose a random yi
Figure US09715590-20170725-P00010
q
 Compute and broadcast Bi = yi · G mod p to all di ∈  
Figure US09715590-20170725-P00003
 Compute
   B = y · G = i = 1 t B i mod p
  e = Hash(G, B,
Figure US09715590-20170725-P00008
pub, τ)
   M i = y i + r i e ( j = 1 j i t - j i - j ) mod q
 Send (Bi, Mi, τ) to verifier  
Figure US09715590-20170725-P00007
Algorithm 5 illustrates a further refinement of Algorithm 3 that incorporates updating the challenge-helper pair and share after each operation. The PUF-Share-Update and PUF-Store algorithms are set forth in the '920 application.
Algorithm 5 Interactive Threshold Proof Construction with Refreshing
Goal: Perform threshold zero knowledge proof at time τ
One-Time Setup Stage
for each Subsystem Device di
Figure US09715590-20170725-P00003
 do
 Run Enrollment Algorithm
 Run Distributed Key Generation Algorithm
Evaluation Stage
for Verifier  
Figure US09715590-20170725-P00007
 do
 Broadcast ephemeral nonce N to all di
Figure US09715590-20170725-P00003
for all Participants pi
Figure US09715590-20170725-P00008
 do
 Recover share ri (τ) ← PUF-Retrieve(ci (τ), helperi (τ))
 Choose a random yi
Figure US09715590-20170725-P00010
q
 Compute and broadcast Bi = yi · G mod p to all di ∈  
Figure US09715590-20170725-P00003
 Compute
    B = y · G = i = 1 t B i mod p
   e = Hash(G, B,
Figure US09715590-20170725-P00008
pub, N)
    M i = y i + r i ( τ ) e ( j = 1 j i t - j i - j ) mod q
 Send (Bi, Mi) to verifier  
Figure US09715590-20170725-P00007
 Update share
   ri (τ+1) ← PUF-Share-Update (ri (τ))
 Store ri (τ+1) and update PUF challenge:
  {ci (τ+1), helperi (τ+1)} ← PUF-Store(ri (τ+1))
Algorithm 6 Interactive Threshold Proof Verification
for Verifier
Figure US09715590-20170725-P00004
 do
 Upon receipt of (Bi, Mi)1≦i≦t, compute:
   B = i = 1 t B i mod p
   M = i = 1 t M i mod q
  e = h(G, B,
Figure US09715590-20170725-P00008
pub, N)
 Verify the proof against the group's public key
Figure US09715590-20170725-P00008
pub = rG:
   B = ? M · G - e · pub mod p = ( y + re ) · G - e · ( rG ) = yG + reG - reG = yG
Decision { accept : B = yG deny : B yG

Layered Security
When the components themselves are unable to generate a proof of correctness, the integrity of the system as a whole must be derived from a root-of-trust. An additional embodiment of the invention is a system achieving a layered security approach across all computing levels by deriving a hardware root-of-trust from a high assurance processor. The high assurance processor is used to validate all layers in a computing architecture, providing secure boot control, change detection, alarm indicators and audit functions. FIG. 3 illustrates the high assurance processor in an exemplary computing architecture.
Secure computing architectures create a layered security approach, where the trusted boundary is iteratively extended from a core root-of-trust. For example, a trusted boot procedure assumes a minimal trust boundary (e.g., a root-of-trust, such as a trusted platform module (TPM)) and iteratively extends the trust boundary by validating each component of the system as it boots. This mitigates risk from components more susceptible to adversarial modification, such as the operating system or applications. The root-of-trust is used to detect modification to system components, and will only complete the boot sequence if all components are validated as correct. However, existing trusted boot systems typically rely on roots-of-trust that are assigned (rather than intrinsic) to the device. For example, TPMs hold a private key in protected memory that represents the identity of the system. Thus, an adversary that extracts the assigned identity is able to masquerade as the system. Further, existing systems do not provide intrinsic tamper detection, and rely on tamper detecting hardware enclosures for security. Existing roots-of-trust are illustrated in FIG. 3 at the root of trust layer 14, which is situated above the hardware layer.
One embodiment of the invention employs a high assurance processor based on a PUF that captures intrinsic and unique properties of the hardware and preferably provides intrinsic hardware tamper detection. As the PUF mapping is a function of the physical properties of the hardware, it can be used to generate a hardware-intrinsic identity that represents the physical state of the system.
Referring to FIG. 3, high assurance processor 10, which is at the hardware layer, is established as the root-of-trust for the system and forms a layered security architecture interaction with application layer 11, operating system layer 12, network layer 13, root of trust layer 14, and hardware layer 15. The high assurance processor 10 addresses NIST SP 800-53 Rev. 4 (“Security and Privacy Controls for Federal Information Systems and Organizations”) Security Capability, where trust is derived from interactions among system sub-components. The high assurance processor 10 may be used in mutual reinforcement controls within the system, where the high assurance processor 10 may validate an existing root-of-trust and vice versa.
The high assurance processor 10 is preferably designed to interact with the system through common commercial standard interfaces (e.g., USB, Ethernet) to enable interaction with commercial-off-the-shelf devices without hardware modification, and integration and continued support may be achieved through firmware and/or software upgrades. At root of trust layer 14 the high assurance processor 10 may be used to extend and/or interact with existing roots-of-trust (e.g., TPM, ARM TrustZone). This enables a system with an existing trusted boot process to remain essentially unchanged, as the high assurance processor 10 can first validate the existing root-of-trust (which can subsequently complete the existing trusted boot process). At application layer 11 the high assurance processor 10 may be used to validate applications prior to execution, for example by storing a cryptographic hash of the application code or binary executable when it is first installed from a trusted source. The high assurance processor 10 signs the cryptographic hash, which may be stored on the system. Before an application may be executed by the system, the high assurance processor 10 first computes a cryptographic hash of the current application code or binary executable, validates its signature on the stored cryptographic hash, and validates that the two hash outputs match. If any of these checks fail, the high assurance processor 10 preferably halts execution of the application and issues an alarm.

Claims (18)

What is claimed is:
1. A system of components configured to attest integrity of the system, the components having a physical state and comprising:
a) a physical unclonable function (‘PUF’) including a PUF input and a PUF output and constructed to generate, in response to the input of a specific challenge, an output value that is characteristic to i) the PUF, ii) the component's physical state, and iii) the specific challenge; and
b) a processor connected to the PUF and configured to, in response to a verification request, provide an input to the PUF input and receive a response from the PUF output, and compute a share for a respective PUF-containing component of a joint threshold proof.
2. The device of claim 1, wherein a respective processor is further configured to convey the share it computes to a secretary.
3. The device of claim 1, wherein the system of components is arranged in a ring and one or more of the processors is configured to convey the share it computes to another component in the ring.
4. The device of claim 1, wherein the joint threshold proof is a zero knowledge proof.
5. A computing system having a high-assurance processor that provides the computing system a hardware root-of-trust, the computing system comprising:
a high-assurance processor that includes a physical unclonable function (‘PUF’), and configured to use the PUF to generate a hardware-intrinsic identity representing the physical state of the computing system and to use the PUF as a root-of-trust for the computing system; and
multiple components and an operating system, wherein the computing system is configured to perform a trusted boot procedure starting with verification of the PUF and establishment of a corresponding minimal trust boundary and component-by-component verification following establishment of the minimal trust boundary.
6. The computing system of claim 5, wherein the PUF is configured to provide intrinsic hardware tamper detection.
7. The computing system of claim 6, wherein the computing system further comprises one or more software applications and the computing system configured to validate any software application prior to permitting its execution.
8. The computing system of claim 7, wherein the computing system is configured to store a signed cryptographic hash of any software application upon installation of the software application, the cryptographic hash being signed by the high-assurance processor using the PUF.
9. The computing system of claim 8, wherein the high assurance processor is configured to, upon requested execution of a software application, compute a cryptographic hash of the software application and validate its signature thereon.
10. The computing system of claim 5, further including an additional root-of-trust.
11. The computing system of claim 10, wherein the high-assurance processor is configured to validate the additional root-of-trust after verification of the PUF.
12. The computing system of claim 11, wherein the additional root-of-trust is a Trusted Platform Module.
13. A computing implemented method for component-by-component verification, the method comprising;
executing, by a high assurance processor having a physical unclonable function (‘PUF’), a trusted boot procedure, wherein executing the trusted boot procedure includes:
verifying a hardware-intrinsic identity representing the physical state of the computing system using the PUF as a root-of-trust for the computing system;
establishing a corresponding minimal trust boundary on the computing system having multiple components and an operating system; and
verifying component-by-component following the act of establishing the minimal trust boundary.
14. The computing implemented method of claim 13, further comprising providing intrinsic hardware tamper detection by the PUF.
15. The method of claim 13, further comprising validating an additional root-of-trust, by the high-assurance processor, after verification of the PUF.
16. The method of claim 13, further comprising validating any software application prior to permitting execution of the software application on the computer system.
17. The method of claim 16, further comprising signing, by the high-assurance processor using the PUF, a cryptographic hash of the software application upon installation.
18. The method of claim 17, further comprising computing a cryptographic hash of the software application and validating a signature on the cryptographic hash, responsive to requested execution of a software application.
US14/704,947 2014-05-05 2015-05-05 System and device for verifying the integrity of a system from its subcomponents Active 2036-01-19 US9715590B2 (en)

Priority Applications (4)

Application Number Priority Date Filing Date Title
US14/704,947 US9715590B2 (en) 2014-05-05 2015-05-05 System and device for verifying the integrity of a system from its subcomponents
US14/746,090 US9292692B2 (en) 2014-05-05 2015-06-22 System and device for verifying the integrity of a system from its subcomponents
DE112016001047.8T DE112016001047B4 (en) 2015-03-05 2016-03-07 System and device for verifying the integrity of a system and its components
PCT/US2016/021264 WO2016141383A1 (en) 2015-03-05 2016-03-07 System and device for verifying the integrity of a system from its components

Applications Claiming Priority (5)

Application Number Priority Date Filing Date Title
US201461988848P 2014-05-05 2014-05-05
US201562128920P 2015-03-05 2015-03-05
US201562150254P 2015-04-20 2015-04-20
US201562150586P 2015-04-21 2015-04-21
US14/704,947 US9715590B2 (en) 2014-05-05 2015-05-05 System and device for verifying the integrity of a system from its subcomponents

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US14/746,090 Continuation-In-Part US9292692B2 (en) 2014-05-05 2015-06-22 System and device for verifying the integrity of a system from its subcomponents

Publications (2)

Publication Number Publication Date
US20150317480A1 US20150317480A1 (en) 2015-11-05
US9715590B2 true US9715590B2 (en) 2017-07-25

Family

ID=54355444

Family Applications (1)

Application Number Title Priority Date Filing Date
US14/704,947 Active 2036-01-19 US9715590B2 (en) 2014-05-05 2015-05-05 System and device for verifying the integrity of a system from its subcomponents

Country Status (1)

Country Link
US (1) US9715590B2 (en)

Cited By (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20170039379A1 (en) * 2015-08-05 2017-02-09 Dell Products L.P. Platform for adopting settings to secure a protected file
US20170093906A1 (en) * 2015-09-25 2017-03-30 Abhilasha Bhargav-Spantzel Technologies for anonymous context attestation and threat analytics
US9946858B2 (en) 2014-05-05 2018-04-17 Analog Devices, Inc. Authentication system and device including physical unclonable function and threshold cryptography
US10013543B2 (en) 2014-05-05 2018-07-03 Analog Devices, Inc. System and device binding metadata with hardware intrinsic properties
US10425235B2 (en) 2017-06-02 2019-09-24 Analog Devices, Inc. Device and system with global tamper resistance
US10432409B2 (en) 2014-05-05 2019-10-01 Analog Devices, Inc. Authentication system and device including physical unclonable function and threshold cryptography
US10958452B2 (en) 2017-06-06 2021-03-23 Analog Devices, Inc. System and device including reconfigurable physical unclonable functions and threshold cryptography
US10999082B2 (en) 2018-09-28 2021-05-04 Analog Devices, Inc. Localized garbled circuit device
US11151290B2 (en) 2018-09-17 2021-10-19 Analog Devices, Inc. Tamper-resistant component networks
US11271757B2 (en) * 2017-12-28 2022-03-08 Mitsubishi Heavy Industries, Ltd. Monitoring device, monitoring system, information processing device, monitoring method, and program
US11528152B2 (en) 2020-10-12 2022-12-13 Raytheon Company Watermarking for electronic device tracking or verification
US11804971B2 (en) 2020-08-05 2023-10-31 Analog Devices, Inc. Correcting physical unclonable function errors based on short integers solutions to lattice problems

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10454691B2 (en) * 2016-05-24 2019-10-22 Arizona Board Of Regents On Behalf Of Northern Arizona University Systems implementing hierarchical levels of security
US10812257B2 (en) 2017-11-13 2020-10-20 Volkswagen Ag Systems and methods for a cryptographically guaranteed vehicle identity
JP6752247B2 (en) * 2018-03-09 2020-09-09 三菱重工業株式会社 Information distribution device, distribution target device, information distribution system, information distribution method and program
US11196575B2 (en) * 2019-04-24 2021-12-07 International Business Machines Corporation On-chipset certification to prevent spy chip
CN113271586B (en) * 2021-04-16 2023-01-17 北京智芯微电子科技有限公司 Power equipment body area network safety communication method and system and storage medium
US20220100908A1 (en) * 2021-12-08 2022-03-31 Intel Corporation Hardware integrity verification mechanism

Citations (23)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030204743A1 (en) 2002-04-16 2003-10-30 Srinivas Devadas Authentication of integrated circuits
US20080133912A1 (en) 2005-07-13 2008-06-05 Nippon Telegraph And Telephone Corporation Authentication System, Authentication Method, Attesting Device, Verification Device, Their Programs, and Recording Medium
US20080256600A1 (en) 2005-09-14 2008-10-16 Koninklijke Philips Electronics, N.V. Device, System and Method for Determining Authenticity of an Item
US20100037056A1 (en) 2008-08-07 2010-02-11 Follis Benjamin D Method to support privacy preserving secure data management in archival systems
US20100122093A1 (en) * 2005-07-07 2010-05-13 Koninklijke Philips Electronics N.V. Method, apparatus and system for verifying authenticity of an object
US20110099117A1 (en) 2008-06-27 2011-04-28 Koninklijke Philips Electronics N.V. Device, system and method for verifying the authenticity integrity and/or physical condition of an item
US20110191837A1 (en) 2008-09-26 2011-08-04 Koninklijke Philips Electronics N.V. Authenticating a device and a user
US20120124385A1 (en) * 2006-04-20 2012-05-17 Siemens Aktiengesellschaft Method, controller and system for detecting infringements of the authenticity of system components
US8290150B2 (en) 2007-05-11 2012-10-16 Validity Sensors, Inc. Method and system for electronically securing an electronic device using physically unclonable functions
US20130051552A1 (en) 2010-01-20 2013-02-28 Héléna Handschuh Device and method for obtaining a cryptographic key
US20130142329A1 (en) 2011-12-02 2013-06-06 Cisco Technology, Inc. Utilizing physically unclonable functions to derive device specific keying material for protection of information
US20130198838A1 (en) * 2010-03-05 2013-08-01 Interdigital Patent Holdings, Inc. Method and apparatus for providing security to devices
US8625788B2 (en) * 2011-01-05 2014-01-07 Intel Corporation Method and apparatus for building a hardware root of trust and providing protected content processing within an open computing platform
US20140093074A1 (en) 2012-09-28 2014-04-03 Kevin C. Gotze Secure provisioning of secret keys during integrated circuit manufacturing
US20140108786A1 (en) 2011-03-11 2014-04-17 Emsycon Gmbh Tamper-protected hardware and method for using same
US20140189890A1 (en) 2012-12-28 2014-07-03 Patrick Koeberl Device authentication using a physically unclonable functions based key generation system
US8782396B2 (en) 2007-09-19 2014-07-15 Verayo, Inc. Authentication with physical unclonable functions
US8918647B1 (en) * 2013-11-10 2014-12-23 Sypris Electronics, Llc Authentication system
US20150058928A1 (en) 2013-08-23 2015-02-26 Qualcomm Incorporated Applying circuit delay-based physically unclonable functions (pufs) for masking operation of memory-based pufs to resist invasive and clone attacks
US20150095655A1 (en) * 2013-09-27 2015-04-02 Brent M. Sherman Apparatus and method for implementing zero-knowledge proof security techniques on a computing platform
US9032476B2 (en) 2009-05-12 2015-05-12 Empire Technology Development Llc Secure authentication
US20160269186A1 (en) * 2014-05-05 2016-09-15 Sypris Electronics, LLC. Authentication system and device including physical unclonable function and threshold cryptography
US20170063559A1 (en) * 2014-05-05 2017-03-02 Sypris Electronics, Llc Authentication system and device including physical unclonable function and threshold cryptography

Patent Citations (23)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030204743A1 (en) 2002-04-16 2003-10-30 Srinivas Devadas Authentication of integrated circuits
US20100122093A1 (en) * 2005-07-07 2010-05-13 Koninklijke Philips Electronics N.V. Method, apparatus and system for verifying authenticity of an object
US20080133912A1 (en) 2005-07-13 2008-06-05 Nippon Telegraph And Telephone Corporation Authentication System, Authentication Method, Attesting Device, Verification Device, Their Programs, and Recording Medium
US20080256600A1 (en) 2005-09-14 2008-10-16 Koninklijke Philips Electronics, N.V. Device, System and Method for Determining Authenticity of an Item
US20120124385A1 (en) * 2006-04-20 2012-05-17 Siemens Aktiengesellschaft Method, controller and system for detecting infringements of the authenticity of system components
US8290150B2 (en) 2007-05-11 2012-10-16 Validity Sensors, Inc. Method and system for electronically securing an electronic device using physically unclonable functions
US8782396B2 (en) 2007-09-19 2014-07-15 Verayo, Inc. Authentication with physical unclonable functions
US20110099117A1 (en) 2008-06-27 2011-04-28 Koninklijke Philips Electronics N.V. Device, system and method for verifying the authenticity integrity and/or physical condition of an item
US20100037056A1 (en) 2008-08-07 2010-02-11 Follis Benjamin D Method to support privacy preserving secure data management in archival systems
US20110191837A1 (en) 2008-09-26 2011-08-04 Koninklijke Philips Electronics N.V. Authenticating a device and a user
US9032476B2 (en) 2009-05-12 2015-05-12 Empire Technology Development Llc Secure authentication
US20130051552A1 (en) 2010-01-20 2013-02-28 Héléna Handschuh Device and method for obtaining a cryptographic key
US20130198838A1 (en) * 2010-03-05 2013-08-01 Interdigital Patent Holdings, Inc. Method and apparatus for providing security to devices
US8625788B2 (en) * 2011-01-05 2014-01-07 Intel Corporation Method and apparatus for building a hardware root of trust and providing protected content processing within an open computing platform
US20140108786A1 (en) 2011-03-11 2014-04-17 Emsycon Gmbh Tamper-protected hardware and method for using same
US20130142329A1 (en) 2011-12-02 2013-06-06 Cisco Technology, Inc. Utilizing physically unclonable functions to derive device specific keying material for protection of information
US20140093074A1 (en) 2012-09-28 2014-04-03 Kevin C. Gotze Secure provisioning of secret keys during integrated circuit manufacturing
US20140189890A1 (en) 2012-12-28 2014-07-03 Patrick Koeberl Device authentication using a physically unclonable functions based key generation system
US20150058928A1 (en) 2013-08-23 2015-02-26 Qualcomm Incorporated Applying circuit delay-based physically unclonable functions (pufs) for masking operation of memory-based pufs to resist invasive and clone attacks
US20150095655A1 (en) * 2013-09-27 2015-04-02 Brent M. Sherman Apparatus and method for implementing zero-knowledge proof security techniques on a computing platform
US8918647B1 (en) * 2013-11-10 2014-12-23 Sypris Electronics, Llc Authentication system
US20160269186A1 (en) * 2014-05-05 2016-09-15 Sypris Electronics, LLC. Authentication system and device including physical unclonable function and threshold cryptography
US20170063559A1 (en) * 2014-05-05 2017-03-02 Sypris Electronics, Llc Authentication system and device including physical unclonable function and threshold cryptography

Non-Patent Citations (20)

* Cited by examiner, † Cited by third party
Title
Asim et al., "Physical Unclonable Functions and Their Applications to Vehicle System Security," Vehicular Technology Conference, VTC Spring 2009, IEEE 69th.
Duc et al., "A survey on RFID security and provably secure grouping-proof protocols," Int'l J. Internet Tech. and Secured Transactions, 2:3/4 (2010).
Ertaul et al., "ECC Based Threshold Cryptography for Secure Data Forwarding and Secure Key Exchange in Manet (I)," Networking 2005, 4th Int'l IFIP-TC6 Networking Conference, Waterloo, Canada (Springer Berlin Heidelberg 2005).
Feiri et al., "Efficient and Secure Storage of Private Keys for Pseudonymous Vehicular Communication", Nov. 2013, ACM, pp. 9-18.
Frikken et al., "Robust Authentication using Physically Unclonable Functions," Information Security, vol. 5735 of Lecture Notes in Computer Science, pp. 262-277 (Springer 2009).
Garcia-Alfaro, "Security Threat Mitigation Trends in Low-cost RFID Systems," Data Privacy Management and Autonomous Spontaneous Security (Springer Berlin Heidelberg 2010).
Gardner et al., "Toward Trusted Embedded Systems," 2nd Annual NSA Trusted Computing Conference & Exposition, Sep. 21, 2011, Orlando, FL.
Ibrahim et al., "Cyber-physical security using system-level pufs," Wireless Communications and Mobile Computing Conference (IWCMC), 2011 7th Int'l, IEEE.
International Search Report and Written Opinion for International Application No. PCT/US16/21264 mailed Jun. 3, 2016.
Khoshroo et al., "Design and Evaluation of FPGA-based Hybrid Physically Unclonable Functions," Master Thesis (Western University, Ontario, 2013).
Krzywiecki et al., "Coalition resistant anonymous broadcast encryption scheme based on PUF," Trust and Trustworthy Computing (Springer Berlin Heidelberg 2011).
Krzywiecki et al., "Collusion Resistant Anonymous Broadcast Encryption Scheme based on PUF," Trust 2011, Pittsburgh.
Owoskin et al., "Hardware-rooted Trust for Secure Key Management and Transient Trust," Proceedings of the 14th ACM Conference: Computer & Communication Security, pp. 389-400.
Owusu et al., "OASIS: On Achieving a Sanctuary for Integrity and Secrecy on Untrusted Platforms", ACM, pp. 13-24.
Peeters et al., "Toward More Secure and Reliable Access Control," Pervasive Computing, IEEE 11:3 (IEEE Computer Society 2011).
Peeters, "Security Architecture for Things That Think," Diss. Ph. D. thesis, KU Leuven, Jun. 2012.
Pfaffhauser, "Protocols for MPC based on Unclonability," Master Thesis (ETH Zurich 2011).
Rigaud (editor) in "D3.1 Report on Protocol choice and implementation," Holistic Approaches for Integrity of ICT-Systems (2014).
Ruan et al., "Elliptic curve ELGamal threshold-based key management scheme against compromise of distributed RSUs for VANETs," Journal of Information Processing 20:4 (2012) (electronic pre-print).
Sadeghi et al., Short Paper: Lightweight Remote Attestation using Physical Functions, Jun. 2011, ACM, pp. 109-114.

Cited By (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10931467B2 (en) 2014-05-05 2021-02-23 Analog Devices, Inc. Authentication system and device including physical unclonable function and threshold cryptography
US9946858B2 (en) 2014-05-05 2018-04-17 Analog Devices, Inc. Authentication system and device including physical unclonable function and threshold cryptography
US10013543B2 (en) 2014-05-05 2018-07-03 Analog Devices, Inc. System and device binding metadata with hardware intrinsic properties
US10771267B2 (en) 2014-05-05 2020-09-08 Analog Devices, Inc. Authentication system and device including physical unclonable function and threshold cryptography
US10432409B2 (en) 2014-05-05 2019-10-01 Analog Devices, Inc. Authentication system and device including physical unclonable function and threshold cryptography
US20170039379A1 (en) * 2015-08-05 2017-02-09 Dell Products L.P. Platform for adopting settings to secure a protected file
US10089482B2 (en) 2015-08-05 2018-10-02 Dell Products Lp Enforcement mitigations for a protected file
US10157286B2 (en) * 2015-08-05 2018-12-18 Dell Products Lp Platform for adopting settings to secure a protected file
US10440046B2 (en) * 2015-09-25 2019-10-08 Intel Corporation Technologies for anonymous context attestation and threat analytics
US20170093906A1 (en) * 2015-09-25 2017-03-30 Abhilasha Bhargav-Spantzel Technologies for anonymous context attestation and threat analytics
US10425235B2 (en) 2017-06-02 2019-09-24 Analog Devices, Inc. Device and system with global tamper resistance
US10958452B2 (en) 2017-06-06 2021-03-23 Analog Devices, Inc. System and device including reconfigurable physical unclonable functions and threshold cryptography
US11271757B2 (en) * 2017-12-28 2022-03-08 Mitsubishi Heavy Industries, Ltd. Monitoring device, monitoring system, information processing device, monitoring method, and program
US11151290B2 (en) 2018-09-17 2021-10-19 Analog Devices, Inc. Tamper-resistant component networks
US10999082B2 (en) 2018-09-28 2021-05-04 Analog Devices, Inc. Localized garbled circuit device
US11804971B2 (en) 2020-08-05 2023-10-31 Analog Devices, Inc. Correcting physical unclonable function errors based on short integers solutions to lattice problems
US11528152B2 (en) 2020-10-12 2022-12-13 Raytheon Company Watermarking for electronic device tracking or verification

Also Published As

Publication number Publication date
US20150317480A1 (en) 2015-11-05

Similar Documents

Publication Publication Date Title
US9292692B2 (en) System and device for verifying the integrity of a system from its subcomponents
US9715590B2 (en) System and device for verifying the integrity of a system from its subcomponents
US11232478B2 (en) Methods and system for collecting statistics against distributed private data
CN109756338B (en) Authentication apparatus, computer-implemented method of authentication apparatus, and computer-readable medium
CN110603783B (en) Secure dynamic threshold signature scheme using trusted hardware
EP3379767B1 (en) Distributed authentication
Syta et al. Keeping authorities" honest or bust" with decentralized witness cosigning
Palaniswamy et al. An efficient authentication scheme for intra-vehicular controller area network
US10833871B2 (en) System and method for deterministic signing of a message using a multi-party computation (MPC) process
Cortier et al. Election verifiability for helios under weaker trust assumptions
Wang et al. Certificateless public auditing for data integrity in the cloud
US10382962B2 (en) Network authentication system with dynamic key generation
EP2182671B1 (en) System, apparatus and method for replacing a cryptographic key
Yu et al. Improved security of a dynamic remote data possession checking protocol for cloud storage
US10425235B2 (en) Device and system with global tamper resistance
Jan et al. A verifiably secure ECC based authentication scheme for securing IoD using FANET
Delavar et al. PUF‐based solutions for secure communications in Advanced Metering Infrastructure (AMI)
CN111211910A (en) Anti-quantum computation CA (certificate Authority) and certificate issuing system based on secret shared public key pool and issuing and verifying method thereof
US20230319103A1 (en) Identifying denial-of-service attacks
US11676111B1 (en) Apparatuses and methods for determining and processing dormant user data in a job resume immutable sequential listing
Fakroon et al. Multifactor authentication scheme using physically unclonable functions
US11361069B2 (en) Subversion resilient attestation for trusted execution environments
JP2002529778A (en) Incorporating shared randomness into distributed encryption
US20210111906A1 (en) Pseudonym credential configuration method and apparatus
Ghaemi et al. Novel blockchain-assisted fault-tolerant roaming authentication protocol for mobility networks without home agent entanglement

Legal Events

Date Code Title Description
AS Assignment

Owner name: GREAT ROCK CAPITAL PARTNERS MANAGEMENT, LLC, NEW Y

Free format text: SECURITY AGREEMENT;ASSIGNORS:SYPRIS SOLUTIONS, INC.;SYPRIS DATA SYSTEMS, INC.;SYPRIS ELECTRONICS, LLC;AND OTHERS;REEL/FRAME:037055/0796

Effective date: 20151030

AS Assignment

Owner name: SYPRIS ELECTRONICS, LLC, FLORIDA

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:WALLRABENSTEIN, JOHN ROSS;WALSH, JOHN J.;GARDNER, DOUGLAS J.;SIGNING DATES FROM 20151020 TO 20151026;REEL/FRAME:038430/0665

AS Assignment

Owner name: SYPRIS TECHNOLOGIES INTERNATIONAL, INC., KENTUCKY

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:GREAT ROCK CAPITAL PARTNERS MANAGEMENT, LLC;REEL/FRAME:039759/0328

Effective date: 20160816

Owner name: SYPRIS TECHNOLOGIES MARION, LLC, KENTUCKY

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:GREAT ROCK CAPITAL PARTNERS MANAGEMENT, LLC;REEL/FRAME:039759/0328

Effective date: 20160816

Owner name: SYPRIS TECHNOLOGIES NORTHERN, INC., KENTUCKY

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:GREAT ROCK CAPITAL PARTNERS MANAGEMENT, LLC;REEL/FRAME:039759/0328

Effective date: 20160816

Owner name: SYPRIS ELECTRONICS, LLC, KENTUCKY

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:GREAT ROCK CAPITAL PARTNERS MANAGEMENT, LLC;REEL/FRAME:039759/0328

Effective date: 20160816

Owner name: SYPRIS TECHNOLOGIES KENTON, INC., KENTUCKY

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:GREAT ROCK CAPITAL PARTNERS MANAGEMENT, LLC;REEL/FRAME:039759/0328

Effective date: 20160816

Owner name: SYPRIS DATA SYSTEMS, INC., KENTUCKY

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:GREAT ROCK CAPITAL PARTNERS MANAGEMENT, LLC;REEL/FRAME:039759/0328

Effective date: 20160816

Owner name: SYPRIS TECHNOLOGIES MEXICAN HOLDINGS, LLC, KENTUCK

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:GREAT ROCK CAPITAL PARTNERS MANAGEMENT, LLC;REEL/FRAME:039759/0328

Effective date: 20160816

Owner name: PNC BANK, NATIONAL ASSOCIATION, PENNSYLVANIA

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:SIENA LENDING GROUP, LLC;REEL/FRAME:039759/0348

Effective date: 20160816

Owner name: SYPRIS SOLUTIONS, INC., KENTUCKY

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:GREAT ROCK CAPITAL PARTNERS MANAGEMENT, LLC;REEL/FRAME:039759/0328

Effective date: 20160816

Owner name: SYPRIS TECHNOLOGIES, INC., KENTUCKY

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:GREAT ROCK CAPITAL PARTNERS MANAGEMENT, LLC;REEL/FRAME:039759/0328

Effective date: 20160816

Owner name: SYPRIS TECHNOLOGIES SOUTHERN, INC., KENTUCKY

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:GREAT ROCK CAPITAL PARTNERS MANAGEMENT, LLC;REEL/FRAME:039759/0328

Effective date: 20160816

AS Assignment

Owner name: ANALOG DEVICES, INC., MASSACHUSETTS

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:SYPRIS ELECTRONICS, LLC;REEL/FRAME:041079/0878

Effective date: 20160816

STCF Information on status: patent grant

Free format text: PATENTED CASE

CC Certificate of correction
MAFP Maintenance fee payment

Free format text: PAYMENT OF MAINTENANCE FEE, 4TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1551); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

Year of fee payment: 4